The nation’s official cyber security agency has issued a new advisory warning of the existence of the Internet ransomware virus
Continue readingNew outage preventing emails on Microsoft Exchange Online
Microsoft is looking into a persistent Exchange Online outage that prevents users from sending emails and results in 503 errors
Continue readingGoogle Play apps with 1.5 million downloads expose your information to China
With over 1.5 million installations combined, two malicious file management apps were identified by security experts on Google Play. These
Continue readingA flaw in Microsoft Teams makes it possible for external accounts to distribute malware
Security researchers have discovered a straightforward method to introduce malware to a Microsoft Teams-using organization, despite the application’s limitations on
Continue readingIncreasing numbers of assaults use new Mystic Stealer malware
Since April 2023, a brand-new information-stealing malware known as “Mystic Stealer” has been advertised on hacking forums and darknet markets,
Continue readingClop ransomware gang extorted MOVEit data-theft victims
The MOVEit data theft attacks have caused the Clop ransomware gang to start extorting businesses, first posting the names of
Continue readingImpersonator of the WannaCry virus targets Russian “Enlisted” FPS players
The Enlisted multiplayer first-person shooter is the target of a ransomware operation that spreads trojanized versions of the game to
Continue readingAIIMS Delhi reports that a new cyberattack was stopped.
On Tuesday, a new cyberattack attempted to target the All India Institute of Medical Sciences in Delhi was stopped. The
Continue readingBotnet Malware Horabot Targets Americans: A Growing Cybersecurity concern
In recent months, a new and highly concerning cybersecurity threat has emerged, known as the botnet malware Horabot. This sophisticated
Continue readingBeware of Email Phishing: Unmasking Attackers Claiming to be Legitimate Individuals
Email phishing continues to evolve as cybercriminals become more sophisticated in their tactics. One prevalent form of email phishing involves
Continue reading